You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -77,7 +77,7 @@ Assuming you have a LDAP database on your docker host in the directory `/data/sl
77
77
and the corresponding LDAP config files on your docker host in the directory `/data/slapd/config`
78
78
simply mount this directories as a volume to `/var/lib/ldap` and `/etc/ldap/slapd.d`:
79
79
80
-
docker run -v /data/slapd/database:/var/lib/ldap \
80
+
docker run -h ldap.example.org -v /data/slapd/database:/var/lib/ldap \
81
81
-v /data/slapd/config:/etc/ldap/slapd.d
82
82
-d osixia/openldap
83
83
@@ -87,17 +87,17 @@ You can also use data volume containers. Please refer to :
87
87
### Using TLS
88
88
89
89
#### Use autogenerated certificate
90
-
By default TLS is enable, a certificate is created for the CN (common name) ldap.example.org. To work properly on your server adjust SERVER_NAME environment variable to match the ldap server CN.
90
+
By default TLS is enable, a certificate is created with the container hostname eg: ldap.example.org.
91
91
92
-
docker run -e SERVER_NAME=ldap.my-compagny.com -d osixia/openldap
92
+
docker run -h ldap.example.org -e SERVER_NAME=ldap.my-compagny.com -d osixia/openldap
93
93
94
94
####Β Use your own certificate
95
95
96
96
Add your custom certificate, private key and CA certificate in the directory **image/service/slapd/assets/ssl** adjust filename in **image/env.yml** and rebuild the image ([see manual build](#manual-build)).
97
97
98
98
Or you can set your custom certificate at run time, by mouting a directory containing thoses files to **/osixia/slapd/assets/ssl** and adjust there name with the following environment variables :
99
99
100
-
docker run -v /path/to/certifates:/osixia/slapd/assets/ssl \
100
+
docker run -h ldap.example.org -v /path/to/certifates:/osixia/slapd/assets/ssl \
101
101
-e SSL_CRT_FILENAME=my-ldap.crt \
102
102
-e SSL_KEY_FILENAME=my-ldap.key \
103
103
-e SSL_CA_CRT_FILENAME=the-ca.crt \
@@ -106,7 +106,7 @@ Or you can set your custom certificate at run time, by mouting a directory conta
106
106
#### Disable TLS
107
107
Add -e USE_TLS=false to the run command :
108
108
109
-
docker run -e USE_TLS=false -d osixia/openldap
109
+
docker run -h ldap.example.org -e USE_TLS=false -d osixia/openldap
110
110
111
111
## Administrate your ldap server
112
112
If you are looking for a simple solution to administrate your ldap server you can take a look at our phpLDAPadmin docker image :
@@ -129,18 +129,17 @@ TLS options :
129
129
-**SSL_CRT_FILENAME**: Ldap ssl certificate filename. Defaults to `ldap.crt`
130
130
-**SSL_KEY_FILENAME**: Ldap ssl certificate private key filename. Defaults to `ldap.key`
131
131
-**SSL_CA_CRT_FILENAME**: Ldap ssl CA certificate filename. Defaults to `ca.crt`
132
-
-**SERVER_NAME**: Use by autogenerated certificate: Server CN. Defaults to `ldap.example.org`
133
132
134
133
### Set environment variables at run time :
135
134
136
135
Environment variable can be set directly by adding the -e argument in the command line, for example :
137
136
138
-
docker run -e LDAP_ORGANISATION="My Compagny" -e LDAP_DOMAIN="my-compagny.com" \
137
+
docker run -h ldap.example.org -e LDAP_ORGANISATION="My Compagny" -e LDAP_DOMAIN="my-compagny.com" \
0 commit comments